OnSecurity Features
What are the features of OnSecurity?
Administration
- Reporting and Analytics
Analysis
- Issue Tracking
Top Rated OnSecurity Alternatives
(11)
4.9 out of 5
Visit Website
Sponsored
OnSecurity Categories on G2
Filter for Features
Orchestration
Asset Management | Lets users group and organize their endpoints to gather threat intelligence on specific technologies. | Not enough data | |
Security Workflow Automation | Reduces the need for IT and security professionals to iterate repetitive tasks associated with gathering threat information. | Not enough data | |
Deployment | The process in which users integrate their existing security systems and endpoints to the threat intelligence platform. | Not enough data | |
Sandboxing | A feature that allows security testing and information gathering to occur in a secure, resource independent environment. | Not enough data |
Information
Proactive Alerts | Prior to security incidents, the product will alert users when a new, relevant vulnerability or threat is discovered. | Not enough data | |
Malware Detection | Provides multiple techniques and information sources to alert users of malware occurrences. | Not enough data | |
Intelligence Reports | The ability for users to produce reports outlining detailed and personalized threat information | Not enough data |
Personalization
Endpoint Intelligence | Analysis for users to examine threat intelligence data specific to their endpoint devices. | Not enough data | |
Security Validation | The product has a recurring examination process to update your intelligence reports as new threats emerge. | Not enough data | |
Dynamic/Code Analysis | The ability to examine your application, website, or database's code to uncover zero-day vulnerabilities. | Not enough data |
Administration
API / Integrations | Application Programming Interface Specification for how the application communicates with other software. APIs typically enable integration of data, logic, objects, etc. with other software applications. | Not enough data | |
Extensibility | Provides the ability to extend the platform to include additional features and functionalities | Not enough data | |
Reporting and Analytics | Based on 11 OnSecurity reviews. Tools to visualize and analyze data. | 97% (Based on 11 reviews) |
Analysis
Issue Tracking | As reported in 10 OnSecurity reviews. Track issues and manage resolutions. | 95% (Based on 10 reviews) | |
Reconnaissance | Gathers information about the system and potential exploits to be tested. | Not enough data | |
Vulnerability Scan | Scans applications and networks for known vulnerabilities, holes and exploits. | Not enough data |
Testing
Command-Line Tools | Allows users to access a terminal host system and input command sequences. | Not enough data | |
Manual Testing | Allows users to perfrom hands-on live simulations and penetration tests. | Not enough data | |
Test Automation | Runs pre-scripted security tests without requiring manual work. | Not enough data | |
Performance and Reliability | Software is consistently available (uptime) and allows users to complete tasks quickly because they are not waiting for the software to respond to an action they took. | Not enough data |
Performance
Issue Tracking | Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process. | Not enough data | |
Detection Rate | The rate at which scans accurately detect all vulnerabilities associated with the target. | Not enough data | |
False Positives | The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists. | Not enough data | |
Automated Scans | Runs pre-scripted vulnerability scans without requiring manual work. | Not enough data |
Network
Compliance Testing | Allows users to scan applications and networks for specific compliance requirements. | Not enough data | |
Perimeter Scanning | Analyzes network devices, servers and operating systems for vulnerabilities. | Not enough data | |
Configuration Monitoring | Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. | Not enough data |
Application
Manual Application Testing | Allows users to perfrom hands-on live simulations and penetration tests. | Not enough data | |
Static Code Analysis | Scans application source code for security flaws without executing it. | Not enough data | |
Black Box Testing | Scans functional applications externally for vulnerabilities like SQL injection or XSS. | Not enough data |